Reference: Top-Notch Report on Chinese Exploitation of US Idiocy & Incompetence

2013 Mandiant_PRC Cyber APT1_Report Phi Beta Iota:  The naive and the unscrupulous emphasis external threats and internal vulnerabilities while glossing over the FACT that this threat was clearly articulated by Winn Schwartau, among others, in 1990, and clearly articulated, in a letter delivered in 1994 to Marty Harris at the National Information Infratructure (NII) reporting …

INTELLIGENCE with INTEGRITY Chapter 2: The InfoSphere & Its Enemies

Utilizar el Traductor de Google en la parte superior de la columna central Utilisez Google Translate au haut de la colonne du milieu Google’ın Orta Sütun Top of Çevir kullanın Используйте Google Translate в верхней части среднего столбца Sử dụng Google Translate Đầu Cột Trung उपयोग Google मध्य स्तंभ के शीर्ष पर अनुवाद 在中间一列的顶部,使用谷歌翻译 04 …

Reflections on Lincoln, Principle, Compromise, Autonomous Internet & Citizen Intelligence / Counter-Intelligence 2.0 with Meta-RECAP

EDIT of 21 January 2013:  I have gotten both sharp criticism from folks I revere, and complements.  I am more than willing to delete this, but I am more interested in having people think outside the lines.  I’ve made some revisions, adding issues and readings in each section.   Email me as you please, robert.david.steele.vivas [at] …

Berto Jongman: 80% of Anonymous Bloggers Identified by Stylometric Analysis?

Stylometric analysis to track anonymous users in the underground paganinip Security Affairs, January 10th, 2013 EXTRACT According an interesting study presented by researcher Sadia Afroz at last edition of Chaos Communication Congress in Germany, the 29C3, up to 80 percent of certain anonymous underground forum users can be identified using linguistics, a data that is …

DefDog: Wired on NYPost Being Retarded – Homework in Class on Terrorism a Threat to National Security – Comment by Robert Steele

NY Post Pisses Its Pants Over Terrorism Homework; And You Should Too Ryan Singel WIRED, 29 October 2012 The New York Post is quivering in fear and outrage over a graduate level course for intelligence analysts that requires students to write a fake terrorism plot, complete with methods of execution, sources of funding, number of …

Marcus Aurelius: Retarded Governments Catch Up with Hacking 101

Two especially intelligent pieces. Mutually Assured Cyberdestruction? David Sanger in New York Times Cyberspace The Fragile Frontier Robert O’Harrow Jr. in Washington Post Phi Beta Iota:  What is so pathetic about all this is that governments have learned nothing in the quarter century since Winn Schwartau, Bill Caelli, Jim Anderson, Robert Steele, and a handful …

DefDog: The infamous ‘take down the Internet in 30 minutes’ hearing from 1998 — Tens of Billions Later, NSA and OMB Have Not Done Their Jobs, US Cyber is Wide Open and Unsafe at Any Speed + Meta-RECAP

This is the famous hearing where Mudge told senators he could K-O the Internet in 30 minutes. It was a wide-ranging discussion, though Mudge’s claim is what the media ran with at the time. Watch and ask yourself, as Trustwave’s Tom Brennan does on his Facebook page this morning: “14 Years… have we gotten better?” …